We have presented a TDMA schedule that is suited to continuous data collection with dynamic traffic patterns. In contrast to most existing TDMA schedules designed for a static network traffic pattern, this paper proposes a novel TDMA schedule that is capable of efficiently collecting sensor data for any network traffic pattern and is thus well […]
Optimizing the performance of a class of distributed systems over the Internet
In this paper, we present a mathematical model and an algorithmic solution to the client-server assignment problem. a large number of clients who communicate with each other indirectly via a number of intermediate servers. Optimizing the overall performance of such a system then can be formulated as a client-server assignment problem whose aim is to […]
HIGH UTILIZATION STRATEGIES FOR COMPUTATIONAL ECONOMIES
Utility computing models have long been the focus of academic research, and with the recent success of commercial cloud providers, computation and storage is finally being realized as the fifth utility. Computational economies are often proposed as an efficient means of resource allocation , however adoption has been limited due to a lack of performance […]
Efficient Global Snapshot Algorithms for Large-Scale Distributed Systems
A global snapshot represents a consistent global state of the system. A global state is consistent if and only if all pairs of its constituent local states of processors are consistent, i.e., if the receiving event of message is recorded, the sending event of the same message must also be recorded, and all in-transit messages […]
FUSION-BASED FAULT TOLERANT DATA STRUCTURES HOSTED ON DISTRIBUTED SERVER
In this paper, we present a technique referred to as fusion which combines the best of both these worlds to achieve the space efficiency of coding and the minimal update overhead of replication. Given a set of data structures, we maintain a set of fused backup data structures that can tolerate f crash faults among […]
Certificate Revocation Scheme with proof facility to provide secure communications in MANETs
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important […]
A Report-based payment scheme for Multihop Wireless Networks
We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store indisputable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., […]
Degraded Document Images Binarization Technique
In this paper, we propose a novel document image binarization technique that addresses these issues by using adaptive image contrast. The adaptive image contrast is a combination of the local image contrast and the local image gradient that is tolerant to text and background variation caused by different types of document degradations. In the proposed […]
IMPROVED COLOR BARCODE WITH INTERFERENCE CANCELLATION
we propose a model-based interference cancellation procedure to overcome interference that is computationally inexpensive and provides a significant performance improvement. Specifically, we exploit this spectral diversity to realize a three-fold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary […]
A novel method to extract features for iris recognition system
IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode […]
- « Previous Page
- 1
- …
- 56
- 57
- 58
- 59
- 60
- …
- 108
- Next Page »